The role of eye gaze in security and privacy applications: Survey and future HCI research directions

C Katsini, Y Abdrabou, GE Raptis, M Khamis… - Proceedings of the 2020 …, 2020 - dl.acm.org
For the past 20 years, researchers have investigated the use of eye tracking in security
applications. We present a holistic view on gaze-based security applications. In particular …

Cognition in social engineering empirical research: a systematic literature review

P Burda, L Allodi, N Zannone - ACM Transactions on Computer-Human …, 2024 - dl.acm.org
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …

{SoK}: Still Plenty of Phish in the Sea—A Taxonomy of {User-Oriented} Phishing Interventions and Avenues for Future Research

A Franz, V Zimmermann, G Albrecht, K Hartwig… - … Symposium on Usable …, 2021 - usenix.org
Phishing is a prevalent cyber threat, targeting individuals and organizations alike. Previous
approaches on anti-phishing measures have started to recognize the role of the user, who …

[HTML][HTML] Which factors predict susceptibility to phishing? An empirical study

L Ribeiro, IS Guedes, CS Cardoso - Computers & Security, 2024 - Elsevier
Phishing is a cybercrime in active growth that victimizes a large number of individuals and
organizations. To explore which individual and contextual factors predict phishing …

[HTML][HTML] Understanding phishing email processing and perceived trustworthiness through eye tracking

J McAlaney, PJ Hills - Frontiers in Psychology, 2020 - frontiersin.org
Social engineering attacks in the form of phishing emails represent one of the biggest risks
to cybersecurity. There is a lack of research on how the common elements of phishing …

Investigating teenagers' ability to detect phishing messages

J Nicholson, Y Javed, M Dixon… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
Young people are increasingly becoming responsible for the security of their devices, yet do
not appear to receive formal instruction on how to protect themselves online. In this paper …

Humans vs. machines in malware classification

S Aonzo, Y Han, A Mantovani, D Balzarotti - 32nd USENIX Security …, 2023 - usenix.org
Humans vs. Machines in Malware Classification Page 1 This paper is included in the
Proceedings of the 32nd USENIX Security Symposium. August 9–11, 2023 • Anaheim, CA, USA …

Is domain highlighting actually helpful in identifying phishing web pages?

A Xiong, RW Proctor, W Yang, N Li - Human factors, 2017 - journals.sagepub.com
Objective: To evaluate the effectiveness of domain highlighting in helping users identify
whether Web pages are legitimate or spurious. Background: As a component of the URL, a …

Human-centered Behavioral and Physiological Security

F Alt, M Hassib, V Distler - Proceedings of the 2023 New Security …, 2023 - dl.acm.org
We propose a paradigm shift in human-centered security research in which users' objective
behavior and physiological states move into focus. This proposal is motivated by the fact that …

[HTML][HTML] Effects of Visual Risk Indicators on Phishing Detection Behavior: An Eye-Tracking Experiment

D Baltuttis, T Teubner - Computers & Security, 2024 - Elsevier
Cybersecurity vulnerability ranks among the foremost global business risks. Phishing
attempts, in particular through email, persistently challenge organizations despite …